Support from readers like you keeps The Journal open.
You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.
If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.
THE HEALTH MINISTER has described as “positive” the initial results from testing the validity of a decryption key that may help the HSE to unlock its IT systems.
The government said yesterday that the tool was made available online. A “detailed technical process” then began to ensure that the key is genuine and will not cause any further damage to the HSE systems.
The HSE shut down its IT systems last Friday after it became aware of a significant ransomware attack.
Stephen Donnelly said security contractors are “testing the validity of the key” at the moment.
“The initial results are positive, but obviously it’s a detailed, technical piece of work,” the Health Minister told RTÉ radio’s Morning Ireland.
And we need to be absolutely sure that this will help restore the health systems, rather than potentially cause further harm. So work is ongoing on that at the moment.
The minister said it’s “unclear” why this decryption tool was made available.
“It came as a surprise. We became aware yesterday afternoon that the key was being made available on a site which is linked to this criminal gang.
“Our technical group obviously then obtained that key, and are currently testing it.”
Advertisement
The Journalreported yesterday that the ransomware attack started when a single computer stopped working, causing its user to reach out for help by clicking on a link.
Donnelly said “no ransom has been paid by this government directly, indirectly, through any third-party or in any other way, nor will any such ransom be paid”.
Reports said the hackers have threatened to release the data if a ransom is not paid by next Monday, a threat Donnelly said is being taken “very seriously”.
“There obviously have been redacted pieces of information put up on the dark web to this point. Because it’s an ongoing criminal investigation, we can’t confirm whether the records are genuine.
“However, as people will be aware. It is entirely possible and this sort of approach is quite standard procedure in these kinds of attacks.”
Injunction
Yesterday, the HSE acquired a court injunction that requires anyone who is possessing HSE data to hand it over and not disclose, trade or deal in the information.
Donnelly defended the injunction, saying officials received a “very positive and strong” result from the judge.
“I don’t imagine that a criminal gang capable of doing what they did to our healthcare system and to patients in our country are going to be too worried about a court order, however it is relevant and very applicable to people here who may seek to share that information themselves, potentially just out of interest or for their own reasons,” he said.
Donnelly added that there is “good progress being made” in restoring some health systems across services for radiology, local labs and patient administration.
Readers like you are keeping these stories free for everyone...
A mix of advertising and supporting contributions helps keep paywalls away from valuable information like this article.
Over 5,000 readers like you have already stepped up and support us with a monthly payment or a once-off donation.
To embed this post, copy the code below on your site
Close
56 Comments
This is YOUR comments community. Stay civil, stay constructive, stay on topic.
Please familiarise yourself with our comments policy
here
before taking part.
@Simon F: they will get to about 95% decrypted and then will need to pay another ransom for the last 5%.
I’m shocked but not surprised that this has happened. I’ve worked in government offices, IT security is a joke antivirus software poorly managed, Non patched outdated servers, and sub par firewall configuration. staff not trained in IT policies and procedures. I’ve worked in primary schools with better IT infrastructure and security.
@Simon F: and how do you know this? Recent similar events with hospital in Germany would suggest that the gang pulled back because of the. heat on them. But I guess facts are an annoyance.
My own theory is Russia has used it’s influence and will / is expecting a reciprocal gesture from Ireland during its tenure on the security council.
@Simon F: Don’t believe so, did similar last month to a major hospital in America. Negotiators told hackers that it was a hospital and they gave them the decryption key. This is bad press for them and they don’t want the pressure, when they realised it was a health care system they made the decryption key available. Personal data still out there though.
@Simon F: Or, perhaps the data has already been sold on the darknet, so the hackers got their money either way and shared the decryption because the data is already out in the wild…
@Simon F: This is not the only way of getting the decryption key; many times in the best gangs would release the Decryption key for free, this month alone a decryption key was released on the Tor Network. The gang have what they wanted personal health data, which could be dumped online or sold to health insurance companies.
@Tom Hickey: Unlikely, if the group are still threatening to release patient data on Monday. The decryption keys have been made available in other hospitals to get critical systems back up running, without any ransom being paid.
What can they do? These guys are untraceable and beyond the reach of our legal system. What it does highlight is that despite the vast sums annually pumped into the hse, they were horribly caught with their IT pants down. All staff should have been properly trained to address any anomolies that might arise and certainly should be doing forward.
@Adrian O’Donnell: well untraceable to us but not to our friends. We don’t have the capability the United States would have. They would know who is at it. But outside our borders means untouchable
@: Oh no, some Russian hackers or someone bothered enough to go hunting on the darkweb will know that I got a mole removed in 2016 and broke my arm when I was 10!
Unless you’re a celebrity/public figure, you shouldn’t care. I doubt your neighbour is going to go on the darkweb to see about your GP check-up history.
Is Ireland the first country where the National healthcare system has been hacked? Obviously many private businesses have been. But a National healthcare system, how did the hackers, as sophisticated as they are, decided on Irelands healthcare system to exploit?
@Alan Watts: yeah, looked it up. 2017 was the last one (warnings of attempted attacks last year). US pipeline was hacked this year but is private company. Old operating systems WXP & Wserver2003 were High risk.
@John Egan: healthcare is a sector thats gets regularly targeted because govt have a lot of money at their disposal and can be embarrassed into actions – there are thousands of attacks on this scale daily – govt sectors – big business and orgs and then smaller `smes are all victims every single day – this one gets all the media coverage but in truth we are no different than every other country – the criminal gang are likely to give them a get out of jail key once they get paid – dont believe this nonsense about a ‘change of heart ‘ by the criminals – but don’t expect anyone to admit to paying ransoms either – they will either spend a lot of time and a lot more money or they will ‘arrange’ for a magic key to be given to them for free ;-) whatever you want to believe really
@Terry Cahill: Closed-Community Policing …’No-one will harass you anymore, walking the streets, and no anti-social behaviour will be tolerated …. including hacking’ :)
@Martin Galvin: No, you got it all wrong Paul rang them in return for his dad’s slot on the Journal this morning. That sorted it—Don’t laugh—He sorted out Greece’s problems. WeLL DIDN’T HE?
All the armchair experts out in full force, giving their expert opinions on how the ransom was paid.
If the same key is used for encryption and decryption, at some point it must have been on the computers in question to perform the encryption. With sufficient motivation and resources it’s entirely possible it could be recovered.
If a different key was used for encryption and decryption, public key cryptography is crackable by definition of how it works. The effort in doing so is what makes it unfeasible.
And in either or neither case, knowing part of the unencrypted contents (which the HSE would) would assist in cryptanalysis.
@JMcB: my point is people are saying it’s not possible to recover such a key without the attackers. This is not true. And they also seem to know we paid the ransom, based on their own hunch.
It’s extremely expensive (computationally) but it can be done, unless you use a key as long as the data itself (a one-time pad)
Every other encryption method, including the ones we use to secure bank transactions, is vulnerable. We just trust that no attacker will be resourceful enough to be able to devote enough resources to decrypt it in any meaningful amount of time.
The more I hear about what our government does in relation to the mess created by hack, the more I get the impression that it is a bunch of clowns trying to run the circus. I see no end of this anytime soon.
My opinion is as follows: The decryption key is capable of working but it also has a hidden switch to activate another dormant zero-day malware already in the systems that will do much more damage. Then the ransom demand will be multiple times the current ask of $20M. There can be no other explaination as to why the key was given for free. If the ransom had been paid then a similar key, without the hidden switch, would have been supplied. I sincerely hope I am wrong
@John Hagin Meade: Well, there can be another explanation, as groups like this have given decryption keys for free in the past to hospitals and other groups where people’s lives were at stake.
And your fantasy scenario makes no sense, as the data just ends up encrypted again, so the whole endeavor was pointless if it ends up back where it started. There is no such thing as “more damage”, it’s either encrypted or it isn’t. If they wanted more money, they can just ask for it the first time, rather than encrypting, then decrypting, then encrypting again. And putting in place daily backups of any critical data (rather than possibly weekly/monthly before), then a future encryption of the data would mean minimal disruption. Plus NetSec can be on higher alert and identify any vulnerabilities that lead to the initial access.
A malware routine to max-out components such as hard disks, CPU or memory modules to cause them to fail is one possibility. Another one is to have the hard disk reformatted when the PC’s are next restarted, such as after an update. While this would not affect the backups that are now being made it would render all the machines unusable and require a full reload/reinstallation of software which is very time consuming. Many years ago the formatting of the hard disk happened to my daughter’s computer due to a virus that only triggered on a Friday when the date was 26. Everything had to be restored. I don’t think these evil hackers will just go away quietly.
Ok so this really sums up the situation.
1 – HSE refuse/make no effort to ensure IT systems are secure despite repeated warning.
2 – HSE gets hit with ransomeware by Russian hackers
3 – HSE refuse to negociate with hackers
4 – Hackers release HSE data on the dark web, no answer from HSE
5 – Hackers give the HSE tool to decrypt data but are going to sell it online. HSE ignore them.
6 – HSE go to IRISH high court and get a court order forbidding anyone to handle the stolen data.
7 – HSE ignore hackers
Now the gas thing here about the court order is this. It won’t do a dam thing to stop the hackers but its an attempt to head off people sueing the HSE over the data breach. If you have the data on your laptop and see your information then its illegal and the HSE lawyers will come after you for having possession of the data. So if you were to take the HSE to counrt over the data breach then you cannot prove in court with 100% accuracy that your data was stolen.
Its like the HSE had a shed full of pigeons and left the door open and they are gonna sue anyone who is in possession of one of their pigeons. Even though they left the door open…..
'A good deal for everybody': US and EU reach 15% tariff deal after Trump-von der Leyen meeting
Updated
3 hrs ago
48.0k
173
Time to say goodbye
Kerry manager strongly indicates he will step down after All-Ireland win
2 hrs ago
6.0k
Listeria
Various branded spinach and mixed leaves recalled due to detection of listeria
Updated
4 hrs ago
57.9k
Your Cookies. Your Choice.
Cookies help provide our news service while also enabling the advertising needed to fund this work.
We categorise cookies as Necessary, Performance (used to analyse the site performance) and Targeting (used to target advertising which helps us keep this service free).
We and our 214 partners store and access personal data, like browsing data or unique identifiers, on your device. Selecting Accept All enables tracking technologies to support the purposes shown under we and our partners process data to provide. If trackers are disabled, some content and ads you see may not be as relevant to you. You can resurface this menu to change your choices or withdraw consent at any time by clicking the Cookie Preferences link on the bottom of the webpage . Your choices will have effect within our Website. For more details, refer to our Privacy Policy.
We and our vendors process data for the following purposes:
Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development.
Cookies Preference Centre
We process your data to deliver content or advertisements and measure the delivery of such content or advertisements to extract insights about our website. We share this information with our partners on the basis of consent. You may exercise your right to consent, based on a specific purpose below or at a partner level in the link under each purpose. Some vendors may process your data based on their legitimate interests, which does not require your consent. You cannot object to tracking technologies placed to ensure security, prevent fraud, fix errors, or deliver and present advertising and content, and precise geolocation data and active scanning of device characteristics for identification may be used to support this purpose. This exception does not apply to targeted advertising. These choices will be signaled to our vendors participating in the Transparency and Consent Framework. The choices you make regarding the purposes and vendors listed in this notice are saved and stored locally on your device for a maximum duration of 1 year.
Manage Consent Preferences
Necessary Cookies
Always Active
These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work.
Social Media Cookies
These cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
Targeting Cookies
These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
Functional Cookies
These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then these services may not function properly.
Performance Cookies
These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not be able to monitor our performance.
Store and/or access information on a device 149 partners can use this purpose
Cookies, device or similar online identifiers (e.g. login-based identifiers, randomly assigned identifiers, network based identifiers) together with other information (e.g. browser type and information, language, screen size, supported technologies etc.) can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here.
Personalised advertising and content, advertising and content measurement, audience research and services development 195 partners can use this purpose
Use limited data to select advertising 158 partners can use this purpose
Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are (or have been) interacting with (for example, to limit the number of times an ad is presented to you).
Create profiles for personalised advertising 119 partners can use this purpose
Information about your activity on this service (such as forms you submit, content you look at) can be stored and combined with other information about you (for example, information from your previous activity on this service and other websites or apps) or similar users. This is then used to build or improve a profile about you (that might include possible interests and personal aspects). Your profile can be used (also later) to present advertising that appears more relevant based on your possible interests by this and other entities.
Use profiles to select personalised advertising 120 partners can use this purpose
Advertising presented to you on this service can be based on your advertising profiles, which can reflect your activity on this service or other websites or apps (like the forms you submit, content you look at), possible interests and personal aspects.
Create profiles to personalise content 51 partners can use this purpose
Information about your activity on this service (for instance, forms you submit, non-advertising content you look at) can be stored and combined with other information about you (such as your previous activity on this service or other websites or apps) or similar users. This is then used to build or improve a profile about you (which might for example include possible interests and personal aspects). Your profile can be used (also later) to present content that appears more relevant based on your possible interests, such as by adapting the order in which content is shown to you, so that it is even easier for you to find content that matches your interests.
Use profiles to select personalised content 48 partners can use this purpose
Content presented to you on this service can be based on your content personalisation profiles, which can reflect your activity on this or other services (for instance, the forms you submit, content you look at), possible interests and personal aspects. This can for example be used to adapt the order in which content is shown to you, so that it is even easier for you to find (non-advertising) content that matches your interests.
Measure advertising performance 177 partners can use this purpose
Information regarding which advertising is presented to you and how you interact with it can be used to determine how well an advert has worked for you or other users and whether the goals of the advertising were reached. For instance, whether you saw an ad, whether you clicked on it, whether it led you to buy a product or visit a website, etc. This is very helpful to understand the relevance of advertising campaigns.
Measure content performance 78 partners can use this purpose
Information regarding which content is presented to you and how you interact with it can be used to determine whether the (non-advertising) content e.g. reached its intended audience and matched your interests. For instance, whether you read an article, watch a video, listen to a podcast or look at a product description, how long you spent on this service and the web pages you visit etc. This is very helpful to understand the relevance of (non-advertising) content that is shown to you.
Understand audiences through statistics or combinations of data from different sources 111 partners can use this purpose
Reports can be generated based on the combination of data sets (like user profiles, statistics, market research, analytics data) regarding your interactions and those of other users with advertising or (non-advertising) content to identify common characteristics (for instance, to determine which target audiences are more receptive to an ad campaign or to certain contents).
Develop and improve services 116 partners can use this purpose
Information about your activity on this service, such as your interaction with ads or content, can be very helpful to improve products and services and to build new products and services based on user interactions, the type of audience, etc. This specific purpose does not include the development or improvement of user profiles and identifiers.
Use limited data to select content 51 partners can use this purpose
Content presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type, or which content you are (or have been) interacting with (for example, to limit the number of times a video or an article is presented to you).
Use precise geolocation data 65 partners can use this special feature
With your acceptance, your precise location (within a radius of less than 500 metres) may be used in support of the purposes explained in this notice.
Actively scan device characteristics for identification 36 partners can use this special feature
With your acceptance, certain characteristics specific to your device might be requested and used to distinguish it from other devices (such as the installed fonts or plugins, the resolution of your screen) in support of the purposes explained in this notice.
Ensure security, prevent and detect fraud, and fix errors 122 partners can use this special purpose
Always Active
Your data can be used to monitor for and prevent unusual and possibly fraudulent activity (for example, regarding advertising, ad clicks by bots), and ensure systems and processes work properly and securely. It can also be used to correct any problems you, the publisher or the advertiser may encounter in the delivery of content and ads and in your interaction with them.
Deliver and present advertising and content 126 partners can use this special purpose
Always Active
Certain information (like an IP address or device capabilities) is used to ensure the technical compatibility of the content or advertising, and to facilitate the transmission of the content or ad to your device.
Match and combine data from other data sources 94 partners can use this feature
Always Active
Information about your activity on this service may be matched and combined with other information relating to you and originating from various sources (for instance your activity on a separate online service, your use of a loyalty card in-store, or your answers to a survey), in support of the purposes explained in this notice.
Link different devices 67 partners can use this feature
Always Active
In support of the purposes explained in this notice, your device might be considered as likely linked to other devices that belong to you or your household (for instance because you are logged in to the same service on both your phone and your computer, or because you may use the same Internet connection on both devices).
Identify devices based on information transmitted automatically 116 partners can use this feature
Always Active
Your device might be distinguished from other devices based on information it automatically sends when accessing the Internet (for instance, the IP address of your Internet connection or the type of browser you are using) in support of the purposes exposed in this notice.
Save and communicate privacy choices 103 partners can use this special purpose
Always Active
The choices you make regarding the purposes and entities listed in this notice are saved and made available to those entities in the form of digital signals (such as a string of characters). This is necessary in order to enable both this service and those entities to respect such choices.
have your say